Main Flashcards
(281 cards)
Prepending
Two seperate definitions
1. Making a message appear more trustworthy by adding text before the message. E.g adding [SAFE] to the subject of an email.
2. Url high hijacking technique where the attacker puts text at the beginning of their typosquatted URL https://pprofessormesser.com/
Pharming
Similar to phishing but attacking DNS in order to redirect to your malicious site in order to harvest credentals.
Pretexting
A fictitious scenario added to a conversation to make a request more believable. Used by attackers in social engineering.
Hoaxes
A threat that doesn’t actually exit.
e.g Email chain about fake cyber attack
Methods for identifying spam
- Allowed list, trusted senders
- SMTP standards checking, block emails that don’t meet RFC standards
- rDNS, reverse DNS, block email where sender’s domai doesn’t match IP address
- Tarpitting, intentionally slow down server conversation
- Recipient filtering, block all email not addressed to valid recipient email address
Credential harvesting
Grabbing all the credentials stored on a PC, phone, etc
Principles of Social Engineering
- Authority
- Intimidation
- Consesus / Social Proof
- Scarcity
- Urgency
- Familiarity / Liking
- Trust
Types of malware
- Virus
- Crypto-malware
- Ransomware
- Worms
- Trojan horse
- Rootkit
- Keylogger
- Adware/Spyware
- Botnet
Virus
Malware that can reproduct itself through file systems or network. Key difference between worms: Virus requires user input to spread, like opening a malicious file
Worms
Malware that self-replicates across a network with no user interaction
Crypto-malware
Newer generation of ransomware, pay the bad guys for your data back. This is what you think of when you think “ransomware”
Ransomware
Malware that attempts to extort money from the target. May or may not encrypt data
Trojan horse
Malware that pretends to be something else, e.g Rouge AV
Rootkit
Malware that modifies core system files, can be invisible to the operating system and traditonal AV
e.g Malicious kernel drivers
Rainbow tables
Optimized pre-built set of hashes
Salt
Random data added to password when hashing. Every user gets own random salt. Stops rainbow tables. Slow down brute force process. Same password will create different hashes depending on the salt.
Machine learning attacks
- Poison the training data
- Find ways to evade the AI. E.g Holes in an AI based IPS or IDS
Birthday attack
Find a collison through brute force. Generate multiple versions of plaintext to match hashes.
Downgrade attack
Attacker forces the system use a worse form of encryption if it is supported.
Replay attack
Gather network information with a tap ARP poisoning, malware, or protocol analyzer. Then resend the information collected to the server, maybe it will be accepted as valid.
SSRF
Server side request forgery. Attacker tells the web server to do something, and it does it. Caused by bad programming and not checking for who sent the request.
Shimming
Code that acts as an adapater for backwards compatibility. Often written by malware developers.
Metamohpric Malware
Refactors itself to make it appear different each time. Intelligently redesigns itself.
SSL Stripping / HTTP Downgrade
Attacker sits in middle of conversation between victim and server. Attacker essentially has all the encryption keys, so it can decrypt the HTTPs data, giving plaintext. Attacker reads everything, but the victim thinks he’s running HTTPS the entire time.